Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-68936 β€” AI Deep Analysis Summary

CVSS 6.4 Β· Medium

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Cross-Site Scripting Vulnerability (XSS)** - Nature: Color theme name is unfiltered - Consequence: Attacker can inject malicious scripts πŸ’₯ - Scripts execute when users browse β†’ account hijacking / information leakage

Q2Root Cause? (CWE/Flaw)

πŸ” **Root Cause** - **CWE-79**: Input not properly escaped - Defect point: **Improper handling of Color theme names** - Leads to scripts being rendered as normal content

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Impact Scope** - ONLYOFFICE Docs **< 9.2.1** - Component: Online document editing service - πŸ“Œ All instances using this version are affected

Q4What can hackers do? (Privileges/Data)

πŸ’£ **Attacker Capabilities** - Requires **regular user privilege** (PR:L) - Can steal session cookies πŸͺ - Can tamper with pages, conduct phishing, induce actions - Affects other users in the same domain (S:C) β†’ expands at…

Q5Is exploitation threshold high? (Auth/Config)

🧩 **Exploitation Threshold** - ❗Low threshold - Only requires **logged-in user** status - No UI interaction needed (UI:N) - Network reachable is sufficient (AV:N)

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ•΅οΈ **Existing Exploit?** - πŸ“­ PoC: **No public proof-of-concept yet** - πŸ“‰ In-the-wild exploitation: **Not reported** - But risk is real ⚠️ Do not underestimate

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check Method** - Check if version number < 9.2.1 ❗ - Search for custom Color theme names containing special characters - Use browser dev tools to see if they are escaped - πŸ› οΈ Can capture packets to verify theme …

Q8Is it fixed officially? (Patch/Mitigation)

πŸ›‘οΈ **Official Fix** - βœ… Fixed in **v9.2.1** - Changelog: [CHANGELOG](https://github.com/ONLYOFFICE/DocumentServer/blob/master/CHANGELOG.md#921) - Recommend immediate upgrade πŸš€

Q9What if no patch? (Workaround)

⚠️ **Countermeasures Without Patch** - Disable custom Color theme feature - Restrict users' permission to modify theme names - Add strict input filtering & output encoding on the front end - Deploy CSP policy to reduce X…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority Recommendation** - 🚨 **High Priority** - CVSS 3.1 Score: **5.4 (Medium)** - Easy to exploit + many users affected - Upgrade or mitigate as soon as possible βœ